File name:

846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd

Full analysis: https://app.any.run/tasks/55abb816-9c0e-430f-8e1c-1446954ff48f
Verdict: Malicious activity
Analysis date: May 10, 2025, 02:36:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

25C67CD4286774B062A247F6701314A0

SHA1:

896C59759863E8AEAF1A9866BC16A326E2CC97BD

SHA256:

846B92D2FCAEEA4BA80C6DA91C3B101B88491E9E0427F6A958CE27D4B5B2F9BD

SSDEEP:

49152:1RnuBD7tSq0QcNj+NM2bm5JcxboHf2ZIfDdLc3LVd4Z/c5GdgCB2hgvRzpg5fVBc:buBftSXNj+NM2bm5JcxboHf2ZCDdLc3+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • isochronal.exe (PID: 2656)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Starts itself from another location

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Executes application which crashes

      • isochronal.exe (PID: 2656)
      • isochronal.exe (PID: 2236)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 2564)
  • INFO

    • Create files in a temporary directory

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • isochronal.exe (PID: 2236)
    • Reads mouse settings

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • isochronal.exe (PID: 2236)
    • The sample compiled with english language support

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Checks supported languages

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • isochronal.exe (PID: 2236)
    • Creates files or folders in the user directory

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
      • isochronal.exe (PID: 2656)
      • WerFault.exe (PID: 2236)
      • WerFault.exe (PID: 6964)
    • Reads the machine GUID from the registry

      • 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe (PID: 6708)
    • Auto-launch of the file from Startup directory

      • isochronal.exe (PID: 2656)
    • Manual execution by a user

      • wscript.exe (PID: 2564)
    • Reads the software policy settings

      • slui.exe (PID: 6768)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:28 00:10:33+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 570880
InitializedDataSize: 859648
UninitializedDataSize: -
EntryPoint: 0x25f74
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
11
Malicious processes
0
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe isochronal.exe svchost.exe no specs sppextcomobj.exe no specs slui.exe werfault.exe no specs wscript.exe no specs isochronal.exe svchost.exe no specs werfault.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2236C:\WINDOWS\SysWOW64\WerFault.exe -u -p 2656 -s 752C:\Windows\SysWOW64\WerFault.exeisochronal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2236"C:\Users\admin\AppData\Local\epistemology\isochronal.exe" C:\Users\admin\AppData\Local\epistemology\isochronal.exe
wscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\epistemology\isochronal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
2564wscript "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\isochronal.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2656"C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe" C:\Users\admin\AppData\Local\epistemology\isochronal.exe
846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\epistemology\isochronal.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
2656"C:\Users\admin\AppData\Local\epistemology\isochronal.exe" C:\Windows\SysWOW64\svchost.exeisochronal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
2960C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5352"C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe" C:\Windows\SysWOW64\svchost.exeisochronal.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
6324C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6708"C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe" C:\Users\admin\AppData\Local\Temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6768"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 424
Read events
4 424
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
11
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2236WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_isochronal.exe_e33cc3debcd9c692644fd1fbeccdfc64b7aef3_63cac8e7_b99ee1a5-28ab-47d2-8cef-f993ceb3afa6\Report.wer
MD5:
SHA256:
6964WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_isochronal.exe_e33cc3debcd9c692644fd1fbeccdfc64b7aef3_63cac8e7_4dd6294a-1507-4ad4-aa8c-94590de84216\Report.wer
MD5:
SHA256:
6708846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exeC:\Users\admin\AppData\Local\Temp\unspawnedbinary
MD5:D97395808D0D77458EA36241E333A0C5
SHA256:86FB04131B66B91746B2783C4EA1653715A96211D76F1457DF898CA763A686A7
2236WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD5F0.tmp.WERInternalMetadata.xmlbinary
MD5:DE1077DE4B531E703DEFE1863BC34DBA
SHA256:96A668DB3C1982CE96EDEF428437F96A4FF11845D0C81B9AB34F241DA37B8B74
2236WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD449.tmp.dmpbinary
MD5:A6843C3C0B52157D070DDD8189BEF847
SHA256:D8AFE6FA77E5C1270179D9050055B55043C299D602D9F23746A88899D5BD2A37
6964WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WEREA83.tmp.xmlxml
MD5:1CADDFEC3A5D7D8D15C81A131E0C1477
SHA256:926A1A5A1F54046CCA8EE3CEA1AA9423FC03C91BE7B2620FDB8624156984420C
2236WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERD64F.tmp.xmlxml
MD5:7995269C6393E43E924AF4A05169A0B2
SHA256:A45CFCE22FD370CF2DB2F6F7EBC6A1AE7C4B4FE2DEB13396C302F5DB3B4247B4
6708846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exeC:\Users\admin\AppData\Local\Temp\autBC0E.tmpbinary
MD5:D97395808D0D77458EA36241E333A0C5
SHA256:86FB04131B66B91746B2783C4EA1653715A96211D76F1457DF898CA763A686A7
6708846b92d2fcaeea4ba80c6da91c3b101b88491e9e0427f6a958ce27d4b5b2f9bd.exeC:\Users\admin\AppData\Local\epistemology\isochronal.exeexecutable
MD5:25C67CD4286774B062A247F6701314A0
SHA256:846B92D2FCAEEA4BA80C6DA91C3B101B88491E9E0427F6A958CE27D4B5B2F9BD
2236WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\isochronal.exe.2656.dmpbinary
MD5:482999678537D71380F27D91F7C05FAC
SHA256:3D028E96219EB1FE87F0087B8F869A045EA81DA7C946924130AC89DE7F1921F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
22
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.18:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
5984
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.18
  • 23.216.77.21
  • 23.216.77.23
  • 23.216.77.25
whitelisted
google.com
  • 142.250.186.46
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.4
  • 40.126.31.130
  • 20.190.159.0
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.71
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.22
whitelisted

Threats

No threats detected
No debug info